Role in IT decision-making process:Align Business & IT GoalsCreate IT StrategyDetermine IT NeedsManage Vendor RelationshipsEvaluate/Specify Brands or VendorsOther RoleAuthorize PurchasesNot Involved

Work Phone:

Company:

Company Size:

Industry:

Street Address

City:

Zip/postal code

State/Province:

Country:

Occasionally, we send subscribers special offers from select partners. Would you like to receive these special partner offers via e-mail?YesNo

Your registration with Eweek will include the following free email newsletter(s):News & Views

By submitting your wireless number, you agree that eWEEK, its related properties, and vendor partners providing content you view may contact you using contact center technology. Your consent is not required to view content or use site features.

By clicking on the "Register" button below, I agree that I have carefully read the Terms of Service and the Privacy Policy and I agree to be legally bound by all such terms.

Privacy Faces New Reality

Gone are the good old days of worry over e-commerce customer lists and fears of unauthorized FBI snooping into the lives of average Americans. From the ruins of the World Trade Center and the Pentagon, a bitter new reality has emerged: Our very lives are

Privacy isnt looking quite so sacred anymore.

Gone are the good old days of worry over e-commerce customer lists and fears of unauthorized FBI snooping into the lives of average Americans. From the ruins of the World Trade Center and the Pentagon, a bitter new reality has emerged: Our very lives are at stake.

The war against terrorism will be waged primarily by spies, counterspies and special forces. Cruise missiles and smart bombs are quaintly passe. The struggle will be won by whomever has the most accurate information on the enemy. For our side, that means high-quality intelligence on terrorist cells, their activities and their plans. For them: good data on our habits, cultural preferences and meeting places.

Further reading

Our task is far more difficult and will require the use of every communications surveillance tool in our arsenal. Wireless, wireline, satellite and Internet communications must all be monitored closely.

Desperate times call for desperate measures. I am willing to give up my own cyberprivacy for the greater good of stopping future terrorist acts and saving lives - with one caveat. Government surveillance must be focused only on those suspected of planning or perpetrating terrorist acts against the U.S. or its allies.

We must be careful not to let last weeks events lead to a permanent surveillance carte blanche. Personal liberty and freedom are hallmarks of our society, and must never be subrogated for tyranny. However, we are in a new war where information is more precious and powerful than military might.